Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2016-3087 — Improper Input Validation in Apache Struts
Severity
9.8CRITICALNVD
EPSS
87.0%
top 0.56%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJun 7
Latest updateMay 14
Description
Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via vectors related to an ! (exclamation mark) operator to the REST Plugin.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages1 packages
🔴Vulnerability Details
4💥Exploits & PoCs
2📋Vendor Advisories
1Red Hat▶
struts: Passing malicious expression can cause RCE when Dynamic Method Invocation is enabled and REST plugin is used↗2016-05-31
💬Community
1Bugzilla▶
CVE-2016-3087 struts: Passing malicious expression can cause RCE when Dynamic Method Invocation is enabled and REST plugin is used↗2016-06-01